CVE-2017-8895
Summary
| CVE | CVE-2017-8895 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2017-05-10 21:29:00 UTC |
| Updated | 2021-08-12 16:22:00 UTC |
| Description | In Veritas Backup Exec 2014 before build 14.1.1187.1126, 15 before build 14.2.1180.3160, and 16 before FP1, there is a use-after-free vulnerability in multiple agents that can lead to a denial of service or remote code execution. An unauthenticated attacker can use this vulnerability to crash the agent or potentially take control of the agent process and then the system it is running on. |
Risk And Classification
Problem Types: CWE-416
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Veritas | Backup Exec | All | All | All | All |
| Application | Veritas | Backup Exec 15 | All | All | All | All |
| Application | Veritas | Backup Exec 15 | All | All | All | All |
| Application | Veritas | Backup Exec 16 | All | All | All | All |
| Application | Veritas | Backup Exec 16 | All | All | All | All |
| Application | Veritas | Backup Exec 2014 | All | All | All | All |
| Application | Veritas | Backup Exec 2014 | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Veritas BackupExec Use-After-Free Memory Error Lets Remote Users Execute Arbitrary Code on the Target System - SecurityTracker | SECTRACK | www.securitytracker.com | Third Party Advisory, VDB Entry |
| VTS17-006: Use-After-Free Vulnerability in Multiple Veritas Backup Exec Agents | Veritas™ | CONFIRM | www.veritas.com | Patch, Vendor Advisory |
| Veritas Backup Exec Use After Free Remote Code Execution Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Veritas/Symantec Backup Exec - SSL NDMP Connection Use-After-Free (Metasploit) - Windows remote Exploit | EXPLOIT-DB | www.exploit-db.com | Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.